Segui
Minghao Zhao
Minghao Zhao
East China Normal University
Email verificata su mails.tsinghua.edu.cn - Home page
Titolo
Citata da
Citata da
Anno
Secure multi-party computation: theory, practice and applications
C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li, Y Tan
Information Sciences 476, 357-372, 2019
4532019
Forward private searchable symmetric encryption with optimized I/O efficiency
X Song, C Dong, D Yuan, Q Xu, M Zhao
IEEE Transactions on Dependable and Secure Computing 17 (5), 912-927, 2018
1802018
Blockchain-based fair payment smart contract for public cloud storage auditing
H Wang, H Qin, M Zhao, X Wei, H Shen, W Susilo
Information Sciences 519, 348-362, 2020
1702020
Rational protocols and attacks in blockchain system
T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang
Security and Communication Networks 2020 (1), 8839047, 2020
822020
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
H Wang, D He, J Shen, Z Zheng, C Zhao, M Zhao
Soft Computing 21, 7325-7335, 2017
572017
Randomness invalidates criminal smart contracts
Y Wang, A Bracciali, T Li, F Li, X Cui, M Zhao
Information Sciences 477, 291-301, 2019
552019
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions
Z Liu, KKR Choo, M Zhao
Computers & Security 69, 97-113, 2017
482017
Secure computation protocols under asymmetric scenarios in enterprise information system
Y Wang, M Zhao, Y Hu, Y Gao, X Cui
Enterprise Information Systems 15 (4), 492-512, 2021
292021
BSM-ether: Bribery selfish mining in blockchain-based healthcare systems
Y Wang, Z Wang, M Zhao, X Han, H Zhou, X Wang, ASV Koe
Information Sciences 601, 1-17, 2022
252022
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
C Hu, Y Xu, P Liu, J Yu, S Guo, M Zhao
Information Sciences 520, 15-30, 2020
252020
Memory-efficient transformer-based network model for traveling salesman problem
H Yang, M Zhao, L Yuan, Y Yu, Z Li, M Gu
Neural Networks 161, 589-597, 2023
232023
Label‐only membership inference attacks on machine unlearning without dependence of posteriors
Z Lu, H Liang, M Zhao, Q Lv, T Liang, Y Wang
International Journal of Intelligent Systems 37 (11), 9424-9441, 2022
192022
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems
Y Wang, Z Wang, G Yang, S Ai, X Xiang, C Chen, M Zhao
Digital Communications and Networks 9 (5), 1053-1060, 2023
172023
Efficient and secure outsourced approximate pattern matching protocol
X Wei, M Zhao, Q Xu
Soft Computing 22, 1175-1187, 2018
172018
Multi-user searchable encryption with a designated server
Z Li, M Zhao, H Jiang, Q Xu
Annals of Telecommunications 72, 617-629, 2017
172017
An ORAM-based privacy preserving data sharing scheme for cloud storage
D Yuan, X Song, Q Xu, M Zhao, X Wei, H Wang, H Jiang
Journal of information security and applications 39, 1-9, 2018
152018
Cut-and-choose bilateral oblivious transfer and its application
C Zhao, H Jiang, X Wei, Q Xu, M Zhao
2015 IEEE Trustcom/BigDataSE/ISPA 1, 384-391, 2015
132015
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial
M Zhao, C Hu, X Song, C Zhao
Journal of Network and Computer Applications 131, 55-65, 2019
122019
Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis
Y Zhang, M Zhao, T Li, Y Wang, T Liang
Information Sciences 625, 299-313, 2023
112023
Keyword guessing on multi-user searchable encryption
Z Li, M Zhao, H Jiang, Q Xu
International Journal of High Performance Computing and Networking 14 (1), 60-68, 2019
112019
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20